CTF collection Vol.1
Task 2: What does the base said?
Can you decode the following? VEhNe2p1NTdfZDNjMGQzXzdoM19iNDUzfQ==
Feed me the flag!
We can decode the flag using the
base64utility.
Answer
Task 3: Meta meta
I'm hungry, I need the flag.
The name of the task hints us that the flag might be in the image metadata.
We can extract this metadata using
exiftool.
Answer
Task 4: Mon, are we going to be okay?
It is sad. Feed me the flag.
Sometimes other data or files can be hidden inside of JPG files.
We can use
steghideto extract these hidden files.
Let's read the
Final_message.txtfile.
Answer
Task 5: Erm......Magick
Huh, where is the flag?
Did you find the flag?
If we just select the task string, we will see the flag.

Answer
Task 6: QRrrrr
More flag please!
The image we have is a QR code.
In order to extract the flag, we can use the ZXing Decoder.

Answer
Task 7: Reverse it or read it?
Found the flag?
For this challenge we are given an executable file.
We can check the strings inside the file using the
stringscommand.
Answer
Task 8 Another decoding stuff
Can you decode it? 3agrSy1CewF9v8ukcSkPSYm3oKUoByUpKG4L
Oh, Oh, Did you get it?
We can use the
Magicfunction from CyberChef to decode the flag.

Answer
Task 9 Left or right
Left, right, left, right... Rot 13 is too mainstream. Solve this MAF{atbe_max_vtxltk}
Let's use the
Rot13function with the amount set to7.

Answer
Task 10: Make a comment
I'm hungry now... I need the flag
Let's inspect the page.

Answer
Task 11: Can you fix it?
I accidentally messed up with this PNG file. Can you help me fix it? Thanks, ^^
Let's check the hash dump of the PNG file.
So the first 4 characters are wrong. In a PNG file the first 4 characters should be
89 50 4E 47as shown in this image:

Let's use
hexeditto fix the bytes.

We should now be able to view the image.

Task 12 Read it
Did you found the hidden flag?
For this question, we have to perform some Google dorking.
Enter the following text in the search bar and click on the first link:

Answer
Task 13: Spin my head
What is this?++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>++++++++++++++.------------.+++++.>+++++++++++++++++++++++.<<++++++++++++++++++.>>-------------------.---------.++++++++++++++.++++++++++++.<++++++++++++++++++.+++++++++.<+++.+.>----.>++++.
Can you decode it?
The text is encrypted using Brainfuck.
We can decode it using an online decoder.

Answer
Task 14: An exclusive!
Exclusive strings for everyone! S1: 44585d6b2368737c65252166234f20626d S2: 1010101010101010101010101010101010
Did you crack it? Feed me now!
Since there are two strings, the possible decryption method is XOR.
Let's use an online decoder.

Answer
Task 15 Binary walk
Flag! Flag! Flag!
We have to extract the embedded files from the JPG file using
binwalk.
We can now read the flag from the
hello.txtfile.
Answer
Task 16 Darkness
What does the flag said?
We have to first download
stegsolvefor this task using the following command:
We have to now move the
dark.pngimage to thebinfolder that we crated.
We are now ready to use
stegsolve.
After opening the image using
stegsolve, we have to go toBlue plane 1to be able to see the flag.

Answer
Task 17: A sounding QR
How good is your listening skill? P/S: The flag formatted as THM{Listened Flag}, the flag should be in All CAPS
What does the bot said?
Let's decode the
QRCTF.pngfile using Zxing.

We are given a Soundcloud link as the result.
Let's visit the link.

The audio tells us that the flag is
soundingqr.
Answer
Task 18: Dig up the past
Sometimes we need a 'machine' to dig the past Targetted website: https://www.embeddedhacker.com/ Targetted time: 2 January 2020
For this one we have to use the Wayback Machine.

Let's look at the snapshot created on January 2, 2020.

Answer
Task 19: Uncrackable!
Can you solve the following? By the way, I lost the key. Sorry >.< MYKAHODTQ{RVG_YVGGK_FAL_WXF} Flag format: TRYHACKME{FLAG IN ALL CAP}
The deciphered text
In this task, we have to use the # Vigenère cipher.
The key is
THM.

Answer
Task 20: Small bases
Decode the following text. 581695969015253365094191591547859387620042736036246486373595515576333693
What is the flag?
We simply have to convert it from Decimal to Hexadecimal to ASCIII.

Hexadecimal

Answer
Task 21: Read the packet
Did you captured my neighbor's flag?
We have to open the PCAP using Wireshark and set the following filter:
That filters for the HTTP packets.
We can find the flag in packet
1827.

Answer
Last updated
Was this helpful?